Scott Solomon is a panelist on the topic of, “The Cost to Reputation,” and Kevin Kirst is a panelist on “Malware: Out of Control?.”
For more information on this conference, click here.
“Bug bounty” demands: legal bane or information security boon?
A “bug bounty” request occurs when a self-described security researcher contacts a company, claiming to have discovered an information security vulnerability,...